-
GUARD
- /en/research-topics/cyber-security/projects/guard
GUARD GUARD A cyber-security framework to GUArantee Reliability and trust for Digital service chains Evolving business models are progressively reshaping the scope and structure of ICT services, with
-
EVE
- /en/research-topics/cyber-security/projects/eve
EVE EVE Efficient prioritisation of emergency vehicles in automated road traffic : International standards for Cooperative and Intelligent Transport Systems (C-ITS) are currently being worked on and n
-
HARMONIC
- /en/research-topics/cyber-security/projects/harmonic
HARMONIC HARMONIC HARMONIsed network through smart technology and Collaboration Based on the results obtained mainly from SESAR W2 this project completes key developments of the Demand and Capacity Ba
-
HyRiM
- /en/research-topics/cyber-security/projects/hyrim
HyRiM HyRiM Hybrid Risk Management for Utility Networks Risk management is a core duty in critical infrastructures as operated by utility providers. Despite the existence of numerous risk assessment t
-
GeRiAn
- /en/research-topics/cyber-security/projects/gerian
GeRiAn GeRiAn General government risk analysis method The aim of a whole-of-government risk analysis is to summarise the results of all sectors at a security policy level. In some sectors, risk analys
-
GENESIS
- /en/research-topics/cyber-security/projects/genesis
GENESIS GENESIS Guideline for strategic infrastructures for the implementation of the NIS Directive in Austria The project aims to develop a risk management framework for the SMEs affected by the NIS
-
e-Panini
- /en/research-topics/cyber-security/projects/e-panini
e-Panini e-Panini Elektronische Plattform eines Bezugsberechtigungssystems für Güter, Produkte und Dienstleistungen To guarantee the sustainable supply of essential goods and services to the populatio
-
DECEPT
- /en/research-topics/cyber-security/projects/decept
DECEPT DECEPT DEtection and Handling of CybEr-Physical Attacks Most of today’s existing security solutions are tailored to protect against a narrow set of security threats and can be applied only to a
-
DAGMAR
- /en/research-topics/cyber-security/projects/dagmar
DAGMAR DAGMAR Data-driven shortage radar for economic crisis preparedness In the course of disruptive political, economic or social crisis events, it may be necessary for those ministries with economi
-
DISCRETION
- /en/research-topics/cyber-security/projects/discretion
DISCRETION DISCRETION Disruptive SDN secure communications for European Defence Software defined networks (SDN) offer several benefits if adopted by European defense. In particular, they are more agil
-
ECOSSIAN
- /en/research-topics/cyber-security/projects/ecossian
ECOSSIAN ECOSSIAN Design of an IOC-based early warning system The protection of critical infrastructures increasingly demands solutions which support incident detection and management at the levels of
-
CySiVuS
- /en/research-topics/cyber-security/projects/cysivus
CySiVuS CySiVuS Cyber security for transport infrastructure and road operators CySiVuS (cyber security for transport and road operators) is an FFG-funded research project ( https://projekte.ffg.at/pro
-
DRBD4Cloud
- /en/research-topics/cyber-security/projects/drbd4cloud
DRBD4Cloud DRBD4Cloud Extending DRBD for Large Scale Cloud Deployments AIT’s main goal during the second project year was the implementation and development of high-performance implementations of secr
-
EUCINF
- /en/research-topics/cyber-security/projects/eucinf
EUCINF EUCINF EUropean Cyber INFormation warfare toolbox The project EUCINF will study, design, prototype, test and demonstrate cutting-edge capabilities in the domain of Cyber and Information Warfare
-
FACT
- /en/research-topics/cyber-security/projects/fact
FACT FACT Federated Advanced Cyber physical Test range The project FACT will deliver a new European capability for cyber physical testing and verification of equipment based on two disruptive and uniq
-
ACCSA
- /en/research-topics/cyber-security/projects/accsa
ACCSA ACCSA Austrian Cyber Crises Support Activities The multitude of reports, newspaper articles and features on cybersecurity and cybercrime (e.g., ransomware, phishing, DDoS, CEO fraud) shows how m
-
CADSP
- /en/research-topics/cyber-security/projects/cadsp
CADSP CADSP Cyber Attack Decision and Support Platform In recent years, large-scale cyber attacks have grown rapidly. These attacks utilize both known attack vectors, e.g. DDoS, as well as previously
-
CERBERUS
- /en/research-topics/cyber-security/projects/cerberus
CERBERUS CERBERUS Cross Sectoral Risk Management for Object Protection of Critical Infrastructures The CERBERUS project ("Cross Sectoral Risk Management for Object Protection of Critical Infrastructur
-
AWAKE
- /en/research-topics/cyber-security/projects/awake
AWAKE AWAKE cyber situational awareness for collaborative knowledge and joint preparedness Large-scale cyber incidents and crises require a collaborative-driven operational incident coordination. In A
-
AInception
- /en/research-topics/cyber-security/projects/ainception
AInception AInception AI Framework for Improving Cyber Defence Operations Most if not all military operations are highly dependent on ICT infrastructures and services. At the same time, adversary stat
- «
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- »